ABSTRACT
P2P file sharing systems such as Gnutella, Freenet, and KaZaA, while primarily intended for sharing multimedia files, frequently allow other types of information to be shared. This raises serious concerns about the extent to which users may unknowingly be sharing private or personal information.In this paper, we report on a cognitive walkthrough and a laboratory user study of the KaZaA file sharing user interface. The majority of the users in our study were unable to tell what files they were sharing, and sometimes incorrectly assumed they were not sharing any files when in fact they were sharing all files on their hard drive. An analysis of the KaZaA network suggested that a large number of users appeared to be unwittingly sharing personal and private files, and that some users were indeed taking advantage of this and downloading files containing ostensibly private information.
- Jacko, J. A. B Salvendy, G. (1996). Hierarchical menu design: Breadth, depth, and task complexity-Perceptual and Motor Skills, 82, 1187--120 1.Google Scholar
- Kiger, J. I. (1984). The depth/breadth tradeoff in the design of menu-driven interfaces International Journal of Man-Machine Studies, 20,201--2 13. Google ScholarDigital Library
- Larson, K. and Czerwinski, M., Web page design: implications of memory, structure and scent for information retrieval, Conference proceedings on Human factors in computing systems, pp. 25--32, ACM. Google ScholarDigital Library
- Milier, G. A. (1956). The magical number seven plus or minus two: Some limits on our capacity for processing information. Psychological Review, 63, 81--97.Google Scholar
- Miller, D. P. (1981). The depth/breadth tradeoff in hierarchical computer menus. Proceedings of the Human Factors Society, 296--300.17.Google ScholarCross Ref
- Saltzer, J. H. and Schroeder, M. D. The Protection of Information in Computer Systems. In Proceedings of the IEEE, vol. 63, no. 9, September 1975, pp. 1278--1308 (see http://web.mit.edu/Saltzer/www/publications/protection/).Google Scholar
- Vincente, K.J. and R.C. Williges, Accommodating Individual Differences in Searching a Hierarchical File System. International Journal of man Machine Studies, 1988. 29. Google ScholarDigital Library
- Whitten A. and Tygar, J. D., Why Johnny can't encrypt. In Proceedings of the 8th USENIX Security Symposium, August 1999.Google ScholarDigital Library
- Yee, K.-P., User Interaction Design for Secure Systems, ICSIS 2002, Singapore. Google ScholarDigital Library
- Zaphiris, P. & Mtei, L. (1997). Depth vs Breadth in the Arrangement Web Links. AvailabIe at http://otal.umd.edu/SHORE/bsOGoogle Scholar
Index Terms
- Usability and privacy: a study of Kazaa P2P file-sharing
Recommendations
Cost-effective broadcast for fully decentralized peer-to-peer networks
Fully unstructured and decentralized peer-to-peer networks such as Gnutella are appealing for a variety of applications, among which file-sharing is the most prominent one. The decentralized nature of these systems provides a high degree of robustness ...
Locality in structured peer-to-peer networks
Distributed hash tables (DHTs), used in a number of structured peer-to-peer (P2P) systems, provide efficient mechanisms for resource placement and location. A key distinguishing feature of current DHT systems, such as Chord, Pastry, CAN and Tapestry, is ...
A connection management protocol for promoting cooperation in Peer-to-Peer networks
The existence of a high degree of free riding in Peer-to-Peer (P2P) networks is an important threat that should be addressed while designing P2P protocols. In this paper we propose a connection-based solution that will help to reduce the free riding ...
Comments